close
close
Your Network of Tomorrow
Your Network of Tomorrow
Plan your path toward a faster, more secure, and more resilient network designed for the applications and users that you support.
          Experience Netskope
          Get Hands-on With the Netskope Platform
          Here's your chance to experience the Netskope One single-cloud platform first-hand. Sign up for self-paced, hands-on labs, join us for monthly live product demos, take a free test drive of Netskope Private Access, or join us for a live, instructor-led workshops.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            A Leader in SSE. Now a Leader in Single-Vendor SASE.
            Netskope debuts as a Leader in the Gartner® Magic Quadrant™ for Single-Vendor SASE
              Securing Generative AI for Dummies
              Securing Generative AI for Dummies
              Learn how your organization can balance the innovative potential of generative AI with robust data security practices.
                Modern data loss prevention (DLP) for Dummies eBook
                Modern Data Loss Prevention (DLP) for Dummies
                Get tips and tricks for transitioning to a cloud-delivered DLP.
                  Modern SD-WAN for SASE Dummies Book
                  Modern SD-WAN for SASE Dummies
                  Stop playing catch up with your networking architecture
                    Understanding where the risk lies
                    Advanced Analytics transforms the way security operations teams apply data-driven insights to implement better policies. With Advanced Analytics, you can identify trends, zero in on areas of concern and use the data to take action.
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        The 6 Most Compelling Use Cases for Complete Legacy VPN Replacement
                        Netskope One Private Access is the only solution that allows you to retire your VPN for good.
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                          Colgate-Palmolive Safeguards its "Intellectual Property” with Smart and Adaptable Data Protection
                            Netskope GovCloud
                            Netskope achieves FedRAMP High Authorization
                            Choose Netskope GovCloud to accelerate your agency’s transformation.
                              Let's Do Great Things Together
                              Netskope’s partner-centric go-to-market strategy enables our partners to maximize their growth and profitability while transforming enterprise security.
                                Netskope solutions
                                Netskope Cloud Exchange
                                Netskope Cloud Exchange (CE) provides customers with powerful integration tools to leverage investments across their security posture.
                                  Netskope Technical Support
                                  Netskope Technical Support
                                  Our qualified support engineers are located worldwide and have diverse backgrounds in cloud security, networking, virtualization, content delivery, and software development, ensuring timely and quality technical assistance
                                    Netskope video
                                    Netskope Training
                                    Netskope training will help you become a cloud security expert. We are here to help you secure your digital transformation journey and make the most of your cloud, web, and private applications.

                                      The case for making security MORE visible

                                      Mar 18 2019
                                      Tags
                                      CISO
                                      IT
                                      Phishing
                                      risk profiles

                                      Traditional information security should, it has been argued, be like Victorian children; best kept out of sight.  Most CISOs aim for security that is invisible to the end user, working away in the background but not impinging on the day or hampering business objectives. While there is a great deal of merit in avoiding security controls that deter productivity, for me, this doesn’t mean that security should be made invisible.

                                      When I was 7, like most of my friends, I began to receive pocket money.  Of course, now that I have my own children I can see that entrusting money to a 7-year-old is just a marginally more interesting way of disposing of cash than burning it. And yet parents (me included) continue to hand hard-earned money to their offspring, with the sure expectation that, at best, it will ultimately fill their house with useless plastic tat or be converted into v-bucks.  So why do we do it? Usually, the aim is to teach financial sense to the children in our care, and this is why I see pocket money as analogous to enterprise security tactics.

                                      When we block and hide every one of the (thousands) of threats a business is subjected to daily and weekly, we not only project a false sense of safety to the employees (“I don’t think our business has ever been the target of a cyber attack, so it probably isn’t an issue for us”) but, overtime, we also cultivate a workforce who have no ability to identify risk (and therefore no understanding of the need to regulate their own behaviours to minimise risk).

                                      When we hand over a few shiny coins to our children (or, nowadays, give them a kids’ payment card) we begin to create an awareness of money management skills. We create opportunities for them to mess up, within a safe environment. Eventually they can leave our care, take on contracts and mortgages, all with a basic understanding of financial risk.

                                      There’s lots of ways we can mimic this approach within the enterprise, creating a greater understanding of threats and the employee’s personal responsibility for awareness and action.  Here’s three of the easiest.

                                      1. Share Risk Profiles

                                      It is becoming common for enterprise security teams to maintain risk profiles at department or even employee level.  Who has remote access to sensitive data? Who needs unfiltered access to social sharing sites as part of their role? Who needs repeated intervention from IT (either manually or automatically)? For most companies, these profiles are internal to the security teams.  We don’t take time to share and answer questions from employees to help recruit them to our cause. But if they have no idea that a certain behaviour creates a risk, how can you expect them to improve? Sharing a risk profile either at department level or based on common poor decisions that have introduced risk, will further educate the organisation and make your next security awareness training programme more tangible and relevant.

                                      2. Catch and Release

                                      I am a big proponent for deliberately letting some phishing attempts through to the employees inbox.  At first glance this may seem insane (78% of people don’t click on a single phishing campaign all year, but, on average, 4% of the targets in any given phishing campaign will click it*). But despite not blocking the originating email, you do not need to completely neglect the other tools at your disposal to remove the actual threat.  Let through a few of the headline grabbing threats, while blocking the link/attachment, wrapping the URL and inserting a pop-up message to the end-user, and so the threat becomes an education opportunity. Judiciously done, over time this builds up understanding among the workforce of what to look out for and how to behave. It also means they start to take notice of those malware headlines and it stops the misconception that their organisation (and they) are never a target.

                                      3. Catch of the Day

                                      Almost every workforce, regardless of size, has one or more individuals who regularly flag threats and attack attempts to the security team.  It’s easy to ignore these efforts (it’s rare that they flag something that we haven’t already discovered), but don’t. If you showcase the value of these security champions-in-the-field, it is a really simple way of raising awareness that there is some level of personal responsibility for vigilance. Even if you aren’t getting any unsolicited help from users in threat identification, take a leaf out of MI5’s book and highlight specific instances of cyber threats that the security team and its tools have caught. Like the catch and release approach, this serves to increase vigilance among employees, and provides an opportunity to educate the organisation about new types of threat.

                                      ENISA’s Threat Landscape Report 2018 was released in January 2019 and it states that security teams should be “making CTI [cyber threat intelligence] available to a large number of stakeholders, with focus on the ones that lack technical knowledge”. Ultimately, there is a balance to be struck between ensuring that security tools and policies do not restrict essential business activities, and making them visible enough to avoid increasingly unaware, individuals.

                                      author image
                                      Neil Thacker
                                      Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.
                                      Neil Thacker is a veteran information security professional and a data protection and privacy expert well-versed in the European Union GDPR.

                                      Stay informed!

                                      Subscribe for the latest from the Netskope Blog